You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/includes/1-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
The Secure methodology in Cloud Adoption Framework for Azure provides a structured approach to help secure your Azure cloud estate.
1
+
The Secure methodology in the Cloud Adoption Framework provides a structured approach to help secure your Azure cloud estate.
2
2
3
3
The guidance in this module provides recommendations that are relevant to all methodologies within the Cloud Adoption Framework. You should incorporate security measures in every phase of your cloud adoption journey.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/includes/2-methodology.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,8 +6,8 @@ This Secure methodology guidance is one component of a larger holistic set of Mi
6
6
7
7
-[The Azure Well-Architected Framework](/azure/well-architected/security/) provides security best practices for application development and DevOps and DevSecOps processes.
8
8
9
-
-[The Microsoft Cloud Security Benchmark](/security/benchmark/azure/) provides best practices for stakeholders. It includes security baselines that describe the available security features and recommended optimal configurations for Azure services.
10
-
-[Zero Trust guidance](/security/zero-trust/) provides guidance for security teams. It describes how to implement technical capabilities that support a Zero Trust modernization initiative.
9
+
-[The Microsoft cloud security benchmark](/security/benchmark/azure/) provides best practices for stakeholders. It includes security baselines that describe the available security features and recommended optimal configurations for Azure services.
10
+
-[Zero Trust documentation](/security/zero-trust/) provides guidance for security teams. It describes how to implement technical capabilities that support a Zero Trust modernization initiative.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/includes/5-plan.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Incorporate Zero Trust principles to structure phases and steps for teams. The M
28
28
29
29
-[Infrastructure](/security/zero-trust/deploy/infrastructure): Guidance for securing cloud infrastructure through strict policies and enforcement strategies.
30
30
31
-
-[Network](/security/zero-trust/deploy/networks): Guidance for securing your cloud network through segmentation, traffic inspection, and end-to-end encryption.
31
+
-[Networks](/security/zero-trust/deploy/networks): Guidance for securing your cloud network through segmentation, traffic inspection, and end-to-end encryption.
32
32
33
33
-[Visibility, automation, and orchestration](/security/zero-trust/deploy/visibility-automation-orchestration): Guidance for operational policies and practices that help enforce Zero Trust principles.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/includes/6-ready.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,31 +42,33 @@ To [help secure data by default](/azure/cloud-adoption-framework/secure/ready#pr
42
42
-**Multifactor authentication (MFA):** Add an extra layer of security.
43
43
-**Conditional access controls:** Enforce policies based on specific conditions, such as geography or MFA requirements. Ensure that your IAM platform supports these controls.
44
44
45
-
Microsoft Entra Conditional Access is the Microsoft Zero Trust policy engine. It evaluates signals from various sources to make informed policy decisions.
45
+
### Azure facilitation
46
+
47
+
[Microsoft Entra Conditional Access](/entra/identity/conditional-access/overview) is the Microsoft Zero Trust policy engine. It evaluates signals from various sources to make informed policy decisions.
46
48
47
49
## Prepare for integrity
48
50
49
51
Ensure that you have [well-governed policies and standards](/azure/cloud-adoption-framework/secure/ready#prepare-for-integrity) for your data and system integrity. Define standards for the following areas.
50
52
51
53
-**Data management:**
52
-
-*Create a framework and sensitivity-label taxonomy* to define data security risk categories. Use this taxonomy to simplify data inventory, policy management, and investigation prioritization.
54
+
- Create a framework and sensitivity-label taxonomy to define data security risk categories. Use this taxonomy to simplify data inventory, policy management, and investigation prioritization.
53
55
54
-
-*Automate data verification and validation processes* to reduce the burden on data engineers and minimize human error.
56
+
- Automate data verification and validation processes to reduce the burden on data engineers and minimize human error.
55
57
56
-
-*Establish and regularly test backup policies* to help ensure that data is backed up, correct, and consistent. Align with your recovery target objective (RTO) and recovery point objective (RPO) targets.
58
+
- Establish and regularly test backup policies to help ensure that data is backed up, correct, and consistent. Align with your recovery target objective (RTO) and recovery point objective (RPO) targets.
57
59
58
-
-*Ensure that your cloud provider encrypts data at rest and data in transit by default.* Verify that services in your workloads support and are configured for strong encryption.
60
+
- Ensure that your cloud provider encrypts data at rest and data in transit by default. Verify that services in your workloads support and are configured for strong encryption.
59
61
60
62
-**System integrity design patterns:**
61
-
-*Design a robust security monitoring platform* to detect unauthorized changes.
63
+
- Design a robust security monitoring platform to detect unauthorized changes.
62
64
63
-
-*Use security information and event management (SIEM), security orchestration, automation, and response (SOAR), and threat detection tools* to identify suspicious activities and potential threats.
65
+
- Use security information and event management (SIEM), security orchestration, automation, and response (SOAR), and threat detection tools to identify suspicious activities and potential threats.
64
66
65
-
-*Automate configuration management* to help ensure consistency and reduce human error.
67
+
- Automate configuration management to help ensure consistency and reduce human error.
66
68
67
-
-*Automate patch management* for virtual machines to help ensure regular updates and consistent system versions.
69
+
- Automate patch management for virtual machines to help ensure regular updates and consistent system versions.
68
70
69
-
-*Use infrastructure as code (IaC)* for all deployments. Integrate IaC into your CI/CD pipelines, and apply safe deployment practices.
71
+
- Use infrastructure as code (IaC) for all deployments. Integrate IaC into your CI/CD pipelines, and apply safe deployment practices.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/includes/7-adopt.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ Effectively implement and institutionalize encryption and secure access controls
95
95
96
96
-[Azure confidential computing](/azure/confidential-computing/overview) helps protect data in use with hardware-based trusted implementation environments, which enhances data security even from cloud administrator access.
97
97
98
-
-[Microsoft Entra ID](/entra/fundamentals/whatis) provides identity and access management with multifactor authentication (MFA), conditional access, and single sign-on.
98
+
-[Microsoft Entra ID](/entra/fundamentals/whatis) provides identity and access management with MFA, conditional access, and single sign-on.
99
99
100
100
-[Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection) uses machine learning to identify sign-in risks and unusual behavior, which prevents identity compromise and credential theft.
101
101
@@ -149,7 +149,7 @@ Focus on establishing and codifying operational practices that [support availabi
149
149
-[Azure Policy](/azure/governance/policy/overview) is a policy management solution that helps enforce organizational standards and assess compliance at scale.
150
150
151
151
-[Defender for Cloud](/azure/defender-for-cloud/security-policy-concept) provides security policies that can automate compliance with your security standards.
152
-
- Azure [built-in recovery capabilities](/reliability/overview-reliability-guidance) support operational continuity and disaster recovery plans.
152
+
- Azure [built-in recovery capabilities](/azure/reliability/overview-reliability-guidance) support operational continuity and disaster recovery plans.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/includes/8-govern.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Cloud technology provides on-demand visibility into your [security posture](/azu
17
17
18
18
-[Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) can help you continuously discover and automatically manage virtual machines in your environment through automatic data collection provisioning.
19
19
20
-
-[Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps) can help you continuously discover and govern software as a service (SaaS) apps in your environments.
20
+
-[Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps) can help you continuously discover and govern software as a service (SaaS) apps in your environments.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/includes/9-manage.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,10 +8,10 @@ The Manage phase focuses on the ongoing operation of your cloud estate. You must
8
8
9
9
Ensure that your observability platform includes thorough monitoring and intelligent alerting. To modernize this platform, adopt a proactive mindset and Zero Trust principles.
10
10
11
-
-**Assume a breach** in your systems to drive threat hunting and detection engineering. Threat hunting uses a hypothesis-based approach to analyze systems for potential breaches. Detection engineering develops specialized mechanisms to enhance observability platforms for detecting new cyberattacks.
12
-
13
11
-**Verify explicitly.** Shift from "trust by default" to "trust by exception" by validating trusted activities through visibility. Enhance your observability platform with intelligent identity and access monitoring to detect anomalous behavior in real-time.
14
12
13
+
-**Assume a breach** in your systems to drive threat hunting and detection engineering. Threat hunting uses a hypothesis-based approach to analyze systems for potential breaches. Detection engineering develops specialized mechanisms to enhance observability platforms for detecting new cyberattacks.
14
+
15
15
### Azure facilitation
16
16
17
17
[Defender XDR](/defender-xdr/m365d-enable) provides advanced threat hunting across multiple domains, like endpoints, cloud apps, and identity.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/index.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ title: Prepare for cloud security by using the Microsoft Cloud Adoption Framewor
14
14
summary: |
15
15
Organizations that move to the cloud often find that they need to modernize security practices and tooling to keep up with continuous changes in cloud platforms, business requirements, and security threats.
16
16
17
-
The Cloud Adoption Framework for Azure consists of eight methodologies. This module focuses on the Secure methodology, which provides guidance for the security modernization journey. It includes processes, best practices, models, and experiences. This guidance adheres to the [Zero Trust principles](https://www.microsoft.com/security/business/zero-trust) and the [CIA Triad principles](/azure/cloud-adoption-framework/secure/overview#the-cia-triad).
17
+
The Cloud Adoption Framework for Azure consists of eight methodologies. This module focuses on the Secure methodology, which provides guidance for the security modernization journey.
18
18
abstract: |
19
19
In this module, you'll learn:
20
20
- The key aspects of the Secure methodology in the Cloud Adoption Framework.
0 commit comments